A beautiful story about true Ubuntu that has nothing to do with computers.
So I’ve had this HP Pavilion g6-2210us for less than a week now. I knew it had Windows 8 when I got it, but I reconciled myself to the “challenge” of getting a Secure Boot-aware Linux distribution working on it.
I did boot Fedora 18 (aka Spherical Cow) from a live disc today. I had no problem with the Secure Boot (which I want to keep turned on so I can dual-boot Windows 8).
But once I got Fedora’s GNOME 3 desktop on screen, it was all graphics problems. First there were artifacts, then a total inability to read any text or see any images clearly. Plus lots of flashing … things.
FYI, this HP Pavilion g6 has the AMD A4-4300M processor with AMD Radeon HD 7420g graphics. I guess Fedora 18 isn’t terribly compatible with it.
I suppose I could install F18, then add repositories to see if AMD’s proprietary drivers make a difference, but I’d rather explore my options. I’m bringing down the Ubuntu GNOME 13.04 Beta live image right now with a torrent. (I can’t do a direct download because I am bandwidth challenged, and using torrents enables me to start and stop the download at will, even between reboots.)
So I guess I’ll be waiting for Fedora 19 and giving the Ubuntu family a try. As I say above, I’m going to start with the GNOME edition (very formerly called Ubuntu GNOME Remix but probably called simply Ubuntu GNOME right now).
This reminds me of the trouble I had with graphics when I first got the Lenovo G555 in May 2010, and how Fedora 13 ran great until a new kernel pretty much ended things.
This laptop is definitely too new to be a comfortable fit for the majority of Linux distributions (most of which aren’t playing along with Secure Boot, either just yet or … ever).
One of the most important people in the Linux world regarding secure boot is Matthew Garrett, recently of Linux giant Red Hat, now with Nebula, who writes about the nuances between secure boot and restricted boot in this post.
Here is a meaty quote:
The x86 market remains one where users are able to run whatever they want, but the x86 market is shrinking. Users are purchasing tablets and other ARM-based ultraportables. Some users are using phones as their primary computing device. In contrast to the x86 market, Microsoft’s policies for the ARM market restrict user freedom. Windows Phone and Windows RT devices are required to boot only signed binaries, with no option for the end user to disable the signature validation or install their own keys. While the underlying technology is identical, this differing set of default policies means that Microsoft’s ARM implementation is better described as Restricted Boot. The hardware vendors and Microsoft define which software will run on these systems. The owner gets no say.
And, unfortunately, Microsoft aren’t alone. Apple, the single biggest vendor in this market, implement effectively identical restrictions. Some Android vendors provide unlockable bootloaders, but others (either through personal preference or at the behest of phone carriers) lock down their platforms.
I’m no expert on UEFI or secure boot. I do know that the traditional BIOS has had its day and then some, and for that reason I believe that UEFI is a step forward that we should all welcome.
The whole secure-boot part of the equation is more troubling, since it’s Microsoft in control of the keys — literally — and it seems both complicated and cost-prohibitive to strike out on one’s own with secure-boot keys.
That’s where guys like Matthew Garrett come in: He was untangling this for Red Hat and hopefully will continue to do so — and to keep us up to date in his blog.